Stop the war!
Остановите войну!
for scientists:
default search action
The International Arab Journal of Information Technology, Volume 21
Volume 21, Number 1, January 2024
- Fouzia El Azzaby, Nabil El Akkad, Khalid Sabour:
The coupling of a multiplicative group and the theory of chaos in the encryptions of images. 1-16 - Bangalore Nagaraj Madhukar, Shivanandamurthy Hiremath Bharathi, Matta Polnaya Ashwin:
Classification of breast cancer using ensemble filter feature selection with triplet attention based efficient net classifier. 17-31 - Deepali Bajaj, Anita Goel, Suresh Chand Gupta:
A comprehensive microservice extraction approach integrating business functions and database entities. 32-45 - Sandeep Sutar, Manjunathswamy Byranahalli Eraiah, Kumarswamy Shivashankaraiah:
A dual-objective approach for allocation of virtual machine with improved job scheduling in cloud computing. 46-56 - Vimala Devi Parthasarathy, Kalaichelvi Visvalingam:
Healthcare data security in cloud storage using light weight symmetric key algorithm. 57-66 - Ruijuan Hu, Haiyan Liu, Wentao Yu:
ERDAP: A novel method of event relation data augmentation based on relation prediction. 67-74 - Jing Zhang, Guiyan Wei, Yonggong Ren:
Cohesive pair-wises constrained deep embedding for semi-supervised clustering with very few labeled samples*. 75-84 - Elamparithi Pandian, K. Ruba Soundar, Shenbagalakshmi Gunasekaran, Shenbagarajan Anantharajan:
Fuzzy heuristics for detecting and preventing black hole attack. 85-93 - Reshma Vengaloor, Roopa Muralidhar:
Deep learning based feature discriminability boosted concurrent metal surface defect detection system using YOLOv-5s-FRN. 94-106 - Khushboo Agarwal, Manish Dixit:
Scrupulous SCGAN framework for recognition of restored images with caffe based PCA filtration. 107-116 - Jiayao Li, Rui Wang:
An anomaly detection method for weighted data based on feature association analysis. 117-127 - Mustafa Al-Fayoumi, Qasem Abu Al-Haija, Rakan Armoush, Christine Amareen:
XAI-PDF: a robust framework for malicious PDF detection leveraging SHAP-based feature engineering. 128-146 - Yuanyuan Gao, Qiang Qian, Xuefeng Sun, Jiankun An, Yutao Yuan:
Evaluation model of athletes' lower extremity training ability based on LSTM algorithm. 147-157 - Abiodun Oguntimilehin, Kolade Balogun:
Real-time sign language fingerspelling recognition using convolutional neural network. 158-165 - Gokul Narayanan, Saravanaguru Kannan:
Enhancing security in cloud-based VM migration: a trust-centric hybrid optimization approach. 166-177
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.